mirror of
https://github.com/bitcoin/bitcoin.git
synced 2026-03-11 16:15:34 +01:00
Merge bitcoin/bitcoin#30538: Doc: add a comment referencing past vulnerability next to where it was fixed
eb0724f0dedoc: banman: reference past vuln due to unbounded banlist (Antoine Poinsot)ad616b6c01doc: net: mention past vulnerability as rationale to limit incoming message size (Antoine Poinsot)4489117c3fdoc: txrequest: point to past censorship vulnerability in tx re-request handling (Antoine Poinsot)68ac9542c4doc: net_proc: reference past DoS vulnerability in orphan processing (Antoine Poinsot)c02d9f6dd5doc: net_proc: reference past defect regarding invalid GETDATA types (Antoine Poinsot)5e3d9f21dfdoc: validation: add a reference to historical header spam vulnerability (Antoine Poinsot) Pull request description: It is useful when reading code to have context about why it is written or behaves the way it does. Some instances in this PR may seem obvious but i think nonetheless offer important context to anyone willing to change (or review a change to) this code. ACKs for top commit: ryanofsky: Code review ACKeb0724f0de. No changes since last review other than rebase Tree-SHA512: 271902f45b8130d44153d793bc1096cd22b6ce05494e67c665a5bc45754e3fc72573d303ec8fc7db4098d473760282ddbf0c1cf316947539501dfd8d7d5b8828
This commit is contained in:
@@ -761,6 +761,8 @@ int V1Transport::readHeader(std::span<const uint8_t> msg_bytes)
|
||||
}
|
||||
|
||||
// reject messages larger than MAX_SIZE or MAX_PROTOCOL_MESSAGE_LENGTH
|
||||
// NOTE: failing to perform this check previously allowed a malicious peer to make us allocate 32MiB of memory per
|
||||
// connection. See https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom.
|
||||
if (hdr.nMessageSize > MAX_SIZE || hdr.nMessageSize > MAX_PROTOCOL_MESSAGE_LENGTH) {
|
||||
LogDebug(BCLog::NET, "Header error: Size too large (%s, %u bytes), peer=%d\n", SanitizeString(hdr.GetMessageType()), hdr.nMessageSize, m_node_id);
|
||||
return -1;
|
||||
|
||||
Reference in New Issue
Block a user